General

  • Target

    06d632f6dd43704ffcdf4df923bf8f01dae2885adcecae5a7ea19df6a7634d77

  • Size

    120KB

  • Sample

    220212-mlgjyschdq

  • MD5

    fd3d5aa0e77c1b04c1636056f5199b7e

  • SHA1

    06138e687d5519bcce31940e84c2113cab34ce07

  • SHA256

    06d632f6dd43704ffcdf4df923bf8f01dae2885adcecae5a7ea19df6a7634d77

  • SHA512

    f5b508a28715280f9473e9f32c7059e23e6ae8b3ee7f16c42385e25fe671befa12943b5823194a846b88bc61002b14c2fc3e0e4f5c51218a2482bee5b8b77eac

Malware Config

Targets

    • Target

      06d632f6dd43704ffcdf4df923bf8f01dae2885adcecae5a7ea19df6a7634d77

    • Size

      120KB

    • MD5

      fd3d5aa0e77c1b04c1636056f5199b7e

    • SHA1

      06138e687d5519bcce31940e84c2113cab34ce07

    • SHA256

      06d632f6dd43704ffcdf4df923bf8f01dae2885adcecae5a7ea19df6a7634d77

    • SHA512

      f5b508a28715280f9473e9f32c7059e23e6ae8b3ee7f16c42385e25fe671befa12943b5823194a846b88bc61002b14c2fc3e0e4f5c51218a2482bee5b8b77eac

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks